Blogs focused on cyber security, data intelligence, and analytics for the hiring economy
The New SEC Guideline on Cyber Security Disclosures
On February 21st, the Securities and Exchange Commission (SEC) released new guidelines on cyber security disclosures. Companies listed on stock exchanges in the United States are instructed to disclose and report cyber security incidents, regardless of whether or not...
The Importance of First Impressions in the Cyber Security Job Search
With many openings and a shortage of talented professionals to fill them, the cyber security job market presents qualified information security professionals with tremendous opportunities for high financial rewards and swift career advancement. These benefits have...
4 Steps to Success in the Cyber Security Job Hunt
For many professionals, job hunting can be one of the most grueling and difficult challenges they face in their careers. This is particularly true for those who are looking to break into the challenging and highly rewarding field of cyber security. Though demand for...
The Challenges and Benefits of Working in Cyber Security
As one of the fastest growing niches in the information technology industry, working in cyber security can be a challenging and rewarding experience at the same time. Though demand for qualified applicants is very high, breaking into this complex arena of...
Cyber Security and the Dark Web
When most people think of the dark web, shady, illegal and malicious activity usually springs to mind. The dark web, sometimes referred to as the Darknet, forms part of the deep web, a sector of the internet that is not indexed by standard search engines...
Talent Retention and Development
It’s well known that a high turnover rate of talented employees has a negative impact on business. In addition to losing valuable individual contributions, the departure can adversely affect the performance of other staff members who relied on work or counsel provided...
Minimizing the Insider Threat to Cyber Security
In 2016, inside staff was directly involved in 32% of damaging cyber security incidents according to a study by NetDiligence, and the danger and scale of potential damage can be much greater due to the increased access that employees have to company...
Challenges and Best Practices in Cyber Security Recruiting
Cyberattacks on large companies such as Sony and Equifax have shown that no one is immune to malicious cyber activity. With demand high for qualified professionals, filling cyber security positions has become a major challenge for companies worldwide....
Why Data Breach Stats can be Deceiving..
Ever wonder why companies who have been breached will estimate the number of affected users, only to announce days, weeks, or months later that the breach was actually much larger? Take the Yahoo breach for example. Originally Yahoo estimated the number...
The New SEC Guideline on Cyber Security Disclosures
On February 21st, the Securities and Exchange Commission (SEC) released new guidelines on cyber security disclosures. Companies listed on stock exchanges in the United States are instructed to disclose and report cyber security incidents, regardless of whether or not...
The Importance of First Impressions in the Cyber Security Job Search
With many openings and a shortage of talented professionals to fill them, the cyber security job market presents qualified information security professionals with tremendous opportunities for high financial rewards and swift career advancement. These benefits have...
4 Steps to Success in the Cyber Security Job Hunt
For many professionals, job hunting can be one of the most grueling and difficult challenges they face in their careers. This is particularly true for those who are looking to break into the challenging and highly rewarding field of cyber security. Though demand for...
The Challenges and Benefits of Working in Cyber Security
As one of the fastest growing niches in the information technology industry, working in cyber security can be a challenging and rewarding experience at the same time. Though demand for qualified applicants is very high, breaking into this complex arena of...
Cyber Security and the Dark Web
When most people think of the dark web, shady, illegal and malicious activity usually springs to mind. The dark web, sometimes referred to as the Darknet, forms part of the deep web, a sector of the internet that is not indexed by standard search engines...
Talent Retention and Development
It’s well known that a high turnover rate of talented employees has a negative impact on business. In addition to losing valuable individual contributions, the departure can adversely affect the performance of other staff members who relied on work or counsel provided...
Minimizing the Insider Threat to Cyber Security
In 2016, inside staff was directly involved in 32% of damaging cyber security incidents according to a study by NetDiligence, and the danger and scale of potential damage can be much greater due to the increased access that employees have to company...
Challenges and Best Practices in Cyber Security Recruiting
Cyberattacks on large companies such as Sony and Equifax have shown that no one is immune to malicious cyber activity. With demand high for qualified professionals, filling cyber security positions has become a major challenge for companies worldwide....
Why Data Breach Stats can be Deceiving..
Ever wonder why companies who have been breached will estimate the number of affected users, only to announce days, weeks, or months later that the breach was actually much larger? Take the Yahoo breach for example. Originally Yahoo estimated the number...